[Subject Prev][Subject Next][Thread Prev][Thread Next][Subject Index][Thread Index]

Fwd: "The End of SSL and SSH?"



Followup to Prabhu's post...FYI
-r.

----- Forwarded message from "Perry E. Metzger" <perry@xxxxxxxxxxxx> -----

Date:         Tue, 19 Dec 2000 13:01:13 -0500
From: "Perry E. Metzger" <perry@xxxxxxxxxxxx>
Subject:      "The End of SSL and SSH?"
To: BUGTRAQ@xxxxxxxxxxxxxxxxx

Kurt Seifried in an article on SecurityPortal shrilly entitled "The
End of SSL and SSH?" claims that SSH needs a PKI to be secure.

The claim is that because people have built man-in-the-middle attack
software (see http://www.monkey.org/~dugsong/dsniff/) that can
intercept SSH sessions, that SSH is insecure. After all, if a MITM
attack happens, the user will be informed of this, and since the user
can choose to ignore the warning that a host key has changed and log
in, SSH must be fatally flawed. Without a PKI, Seifried claims, there
is no way to know if a host key is authentic.

This argument makes absolutely no sense to me.

The problem is simply one of the user interface allowing a user to
ignore a security failure. If a remote login utility using a PKI
prompted the user with "host key is not certified, log in anyway?", it
would be no better than SSH implementations. If A kerberized remote
login utility prompted a user with "remote key is incorrect, log in
anyway", it too would be no better.

If this is truly the extent of the flaw Mr. Seifried things requires a
full PKI to fix, I'd like to know why setting

StrictHostKeyChecking yes

isn't a near-complete fix to the "End of SSH" Mr. Seifried predicts.


Perry Metzger

----- End forwarded message -----

-- 
Ravikant K.Rao | ravi@xxxxxxxxxxx | ravi@xxxxxxxxxxx 
  4:14pm  up 5 days,  7:06,  4 users,  load average: 0.16, 0.23, 0.24
Today is the tomorrow you worried about yesterday.
---
Visit our home page at: www.chennailug.org
Send e-mail to 'ilugc-request@xxxxxxxxxxxxxxxxxx' with 'unsubscribe' 
in either the subject or the body to unsubscribe from this list.